Research in Computer Science
Research Interests –
Operating systems, Cryptography, Network Security, Critical infrastructure protection and Wireless sensor networks.
Publications –
1) IEC 61850 Prototype Design
ABSTRACT
In this paper, we discuss information model of IEC 61850 protocol. We give the prototype design of information model of IEC 61850 and study record accessing times. We suggest use of real time main memory database model for IEC 61850. We also use TLSF memory allocator for assigning memory to records in IEC 61850 prototype. We suggest a back up scheme for database for fast crash recovery. Finally we study transaction processing and security of database.
Suhas Aggarwal
2nd IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2011), Anaheim, CA USA (Accepted)
Acknowledgement – I would like to thank Professor Carl Gunter and Jianqing Zhang for providing immense guidance and support.
Conference website -
Cheetah - IEC 61850 Server code available at - http://sites.google.com/site/suhasprojectprofilesite/sieds-2
2) Security Hub Architecture support for IEC 61850 information exchange protocols
ABSTRACT
In this paper, we give a brief idea about substation devices, substation network and communication model used in IEC 61850. We propose security hub architecture support for IEC 61850 Information exchange protocols. Transmission of GOOSE and SMV messages in substation network follow publisher/subscriber model. Security hub architecture support for publisher/subscriber model is discussed. Group communication possibilities among SIEDs are explored and use of security hub for secure group communication is proposed. Role of Security Hub as a Key Manger and Distributor is discussed. Possibilities of group dynamics behavior among substation SIEDs are explored. Use of key graphs for secure group communication among substation SIEDs are also discussed. Finally, we show certain flaws present in security hub architecture and propose attacks and solutions to these attacks. A modification to IEC 61850 protocol stack is also suggested.
Suhas Aggarwal
3rd IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2012), Anaheim, CA USA (Accepted)
Acknowledgement – I would like to thank Professor Carl Gunter and Jianqing Zhang for providing immense guidance and support.
3)CAPTCHAs with a purpose
ABSTRACT
In this paper, we develop a new genre of Captchas called CAPTCHAs with a purpose. These CAPTCHAs apart from having its applications serve some useful purpose. Recaptcha is one such Captcha developed at Carnegie Mellon University. It helps to digitize books. Another such Captcha is Asirra developed at Microsoft which provides homes for homeless animals. In this paper, we present Time based, Sentence based, Human Emotion based CAPTCHAs which have range of other useful purpose such as measuring reaction time of people, promoting news, general knowledge facts, jokes among people while engaging in routine activities such as checking email. Also they can be used for conducting online polls on a very large scale. We also present a new scheme which renders attack on CAPTCHAs useless.
Suhas Aggarwal
IEEE Second International Conference on Emerging Applications of Information Technology (Organised by Indian Statistical Institute (ISI), Calcutta)
(EAIT 2011), Kolkata, India (Accepted)
Acknowledgement - I would like to thank Professor Sukumar Nandi, Professor Sung Ming Yen, Professor Luis Von Ahn, Murphy Hsu, Michael Lemay, Ritesh Ratti for providing immense guidance and support.
Conference website –
https://sites.google.com/site/csieait2011/
4)A key recovery scheme
ABSTRACT
With the increased use of encryption in business, key recovery has emerged as a critical issue to users. As encryption is deployed to protect files and network communications, users must include safeguards that prevent the inadvertent loss of data and use of the network for malicious intent. This paper explains what key recovery is, presents a refined practical model of a key recovery scheme and describes a new key recovery scheme compliant with this model. A novel feature of this key recovery scheme is that it is resistant to online guessing attack. Most of key recovery schemes used today are able to detect online guessing attack but not able to prevent it. Consequently, users face the problem of denial of service which occurs when key recovery server shuts down the service to legitimate users though temporarily as a security measure. Key recovery server also, often ask users to change password which was attacked causing further inconvenience. So, a security solution Captcha is employed in this new key recovery scheme to make it secure against online guessing attack.
Suhas Aggarwal
IEEE International conference on Information Security and Artificial Intelligence
(ISAI 2010), Chengdu, China (Accepted)
Acknowledgement – I would like to thank Professor Sukumar Nandi, Professor Sung Ming Yen, Murphy Hsu, Ritesh Ratti for providing immense guidance and support.
5) ‘N’ Client Simulation Using User Mode Linux
ABSTRACT
User mode linux (UML) is a open source software that allows to run Linux in a “virtual machine” on top of a physical Linux box. UML allows one to run Linux kernels as user mode processes under a host Linux kernel, giving a simple way to run several independent virtual machines on a single piece of physical hardware. So, with the help of UML, we can simulate large no. of computers (PCs). In this paper we give a methodology to simulate large no. of PCs using UML. These PCs are actually virtual machines running on top of a host. We studied maximum no. of PCs that can be simulated on a host with given RAM. We configure various functions on these PCs such as access to the internet, executing commands on these PCs simultaneously. This simulation is useful in many scenarios especially for experimentation purposes. One application of software will be in testing MPP, a product developed at HSR, Switzerland. It enables users to buy access to the internet at Hotspots. But right now, there is a problem when no. of clients trying to connect simultaneously to a server, exceed a given limit. So, a software to simulate this environment has to be designed to avoid use of large no. of physical computers which is expensive and infeasible.
Suhas Aggarwal
3rd IEEE International Conference on Computer modeling and simulation (ICCMS 2011), Mumbai, India (Accepted)
Acnowledgement- I would like to thank Professor Beat Stettler, Michael Schneider for providing immense guidance and support.
6)Reducer – A Tool to reduce redundant Disk I/O
ABSTRACT
Most of the people use virus scanners and security applications such as anti spywares, rootkit hunters to secure their PC. Majority of population also use backup programs to backup their data and prevent data loss. One concern regarding these applications is that they all need to scan the system as part of their functioning. Scanning process demands lots of disk reads, which implies these applications are disk I/O intensive and tend to put a lot of load on the disk. Moreover, when these applications are installed on a single system for different purposes they are meant for system is read multiple times, one time corresponding to each application, thus inducing redundant Disk I/O .
In this paper, we create a pipeline to reduce redundant Disk I/O activity and make this process more efficient. We tried to achieve co-ordination between different scanning applications and tried to schedule them using round robin scheme. Trick is to make use of buffer cache to reduce Disk I/O. Accessing buffered file blocks is much cheaper100-1000 times cheaper than accessing the same block from the disk.When a scanning application does some disk reads, file blocks read will be cached for some time, this fact can be exploited and used to reduce disk I/O , if another scanning application which also need to read these file blocks as part of its functioning, access blocks from buffer cache (cached due to an earlier scanning activity), instead of reading these same blocks again from the disk and, thus reducing disk I/O. We achieve this, by scheduling the scans according to a scheduling algorithm namely round robin scheme and have been able to observe significant disk I/O reduction, about 50% in some cases .
Suhas Aggarwal, Hemangee Kapoor, Atul Prakash
3rd IEEE International Conference on Computer modeling and simulation (ICCMS 2011), Mumbai, India (Accepted) – Withdrawn for further improvements
Supervisor – Professor Hemangee Kapoor, Professor Atul Prakash
Working papers -
7) SSL system using Cab Curves
ABSTRACT -
In this paper, we study the possibility of constructing a SSL system based on Cab curves. Although, it is now clear that high genus curves are unsuitable for cryptographic use. The discrete logarithm problem in Jacobians of curves of high genus g over finite fields Fq is known to be computable with subexponential complexity Lqg (1/2, O(1)).Though, practicality of SSL system based on Cab curves is questionable but we intend to prepare an implementation just for the study sake.
Suhas Aggarwal, Professor Josep M Miret Biosca - In Preparation
8)Energy Management Architecture for Datacenters
ABSTRACT
Energy efficiency has been a major challenge for datacenters. Advances in server equipment technologies and increased demand for computing power have increased load densities in the computer room, which in turn has caused corresponding increases in datacenter power consumption. Clearly, considerably high consumption of energy costs significant money and its production causes carbon emissions. Though several ways to reduce energy consumption has been studied via virtualization, using air conditioner in economizer modes, using ’green’ power equipment, proper configuration of server software etc. but not much study has been done in effectively managing available power. In this paper, we propose an energy management architecture to effectively manage available power. Some of the key features of the architecture are prioritizing power requests and allocating power based on dynamic constraints. We then study, how does it affect our goal of cutting down power costs and effectively utilizing available power. Similar architecture can also be adopted for managing energy consumption in buildings.
Suhas Aggarwal – In preparation
9)Designing Audio CAPTCHAs
ABSTRACT
In this paper, we design several CAPTCHAs based on sound. These audio tests might be difficult for common usage but might be easy for blind people. Tests include presenting a dialogue depicting a scenario, user has to identify the scenario, asking questions based on enormity of ‘where’ and ‘object’ domain, challenges related to identifying different kinds of sounds like sounds of animals, vehicles ,weather conditions like raining, lighning etc. Presenting sounds in slightly noisy background might also be tried to make it complex for attacker.
Suhas Aggarwal
Techscribe,Paper presentation contest, Techniche 2007, IIT Guwahati
10)Shopping mall management system
ABSTRACT
Sometimes searching for a product in the shopping mall can be very time consuming. In this paper ,we present a management system for shopping malls which makes it easier for querying of available products and finding their location. We also demonstrate its prototype and user interface.
Suhas Aggarwal
Techscribe,Paper presentation contest, Techniche 2007, IIT Guwahati